Malicious File Detection Using Yara

Critical Nessus Plugin ID 91990


Nessus detected malicious files on the remote host.


Nessus detected one or more files on the remote Windows host that match a Yara rule.

Note that Nessus has only scanned files with the following extensions :

.application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .js, .jse, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xm, .ps2, .ps2xm, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vb, .vbe, .vbs, .vbscript, .ws, .wsf, .xls, .xls

See Also

Plugin Details

Severity: Critical

ID: 91990

File Name: wmi_malware_yara_filesystem.nbin

Version: 1.110

Type: local

Agent: windows

Family: Windows

Published: 2016/07/11

Updated: 2021/01/15

Dependencies: 59275

Risk Information

Risk Factor: Critical

CVSS Score Source: manual

CVSS Score Rationale: The detection is suspected as being malware.

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

Required KB Items: malscan/enabled